New Exploit - no warning (Windows Explorer on XP)...

Discussion in 'other software & services' started by tosbsas, Jan 27, 2004.

Thread Status:
Not open for further replies.
  1. tosbsas

    tosbsas Registered Member

    Feb 9, 2002
    Lima, Peru
    Windows XP Explorer Executes Arbitrary Code in Folders
    SecurityTracker Alert ID: 1008843    
    CVE Reference: GENERIC-MAP-NOMATCH (Links to External Site)    
    Date: Jan 25 2004
    Impact: Execution of arbitrary code via network, User access via network
    Exploit Included: Yes
    Version(s): Windows XP Explorer
    Description: A vulnerability was reported in Microsoft Windows XP in Windows Explorer. A remote user can create a folder that, when viewed by the target user, will execute arbitrary code on the target user's system.

    http-equiv reported that a remote user can create a specially crafted 'folder' that includes HTML scripting code and a Windows executable ('.exe' file) containing arbitary code. When a target user attempts to view the contents of the 'folder' (which may be considered an ostensibly safe task by many users), the arbitrary code will be automatically executed on the target user's computer by Windows Explorer. The code will run with the privileges of the target user.

    If the 'folder' is an HTML-based file, Windows Explorer (on XP) will execute the file when viewed, extracted, or opened. The scripting code can reference the executable contained in the 'folder', causing the executable to run.

    A demonstration exploit is available at:

    Impact: A remote user can cause arbitrary code to be executed on the target user's system.
    Solution: No solution was available at the time of this entry.
    Vendor URL: (Links to External Site)
    Cause: State error
    Underlying OS: Windows (XP)
    Reported By: "" <>
    Message History: None.

    - Changed title and deactivated the exploit demo link - LWM
  2. LowWaterMark

    LowWaterMark Administrator

    Aug 10, 2002
    New England
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.